Maciej Skórski
Maciej Skórski
University of Luxemvbourg
Verified email at mimuw.edu.pl - Homepage
Title
Cited by
Cited by
Year
Noisy leakage revisited
S Dziembowski, S Faust, M Skorski
Annual International Conference on the Theory and Applications of …, 2015
212015
Renyi entropy estimation revisited
M Obremski, M Skorski
122017
Metric pseudoentropy: Characterizations, transformations and applications
M Skorski
International Conference on Information Theoretic Security, 105-122, 2015
122015
Shannon entropy versus renyi entropy from a cryptographic viewpoint
M Skórski
IMA International Conference on Cryptography and Coding, 257-274, 2015
102015
Condensed unpredictability
M Skorski, A Golovnev, K Pietrzak
International Colloquium on Automata, Languages, and Programming, 1046-1057, 2015
92015
Optimal amplification of noisy leakages
S Dziembowski, S Faust, M Skórski
Theory of Cryptography Conference, 291-318, 2016
52016
The chain rule for HILL pseudoentropy, revisited
K Pietrzak, M Skórski
International Conference on Cryptology and Information Security in Latin …, 2015
52015
Modulus computational entropy
M Skorski
International Conference on Information Theoretic Security, 179-199, 2013
52013
Simulating auxiliary inputs, revisited
M Skorski
Theory of Cryptography Conference, 159-179, 2016
32016
Privacy and secrecy with multiple measurements of physical and biometric identifiers
O Günlü, G Kramer, M Skórski
2015 IEEE Conference on Communications and Network Security (CNS), 89-94, 2015
32015
Analytic formulas for renyi entropy of hidden markov models
J Breitner, M Skorski
arXiv preprint arXiv:1709.09699, 2017
22017
A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds
M Skórski
International Conference on Theory and Applications of Models of Computation …, 2017
22017
Pseudoentropy: Lower-bounds for Chain rules and Transformations
K Pietrzak, M Skórski
Theory of Cryptography Conference, 183-203, 2016
22016
A Subgradient Algorithm For Computational Distances and Applications to Cryptography.
M Skórski
IACR Cryptol. ePrint Arch. 2016, 158, 2016
22016
How much randomness can be extracted from memoryless Shannon entropy sources?
M Skorski
International Workshop on Information Security Applications, 75-86, 2015
22015
A time-success ratio analysis of wprf-based leakage-resilient stream ciphers
M Skorski
arXiv preprint arXiv:1505.06765, 2015
22015
Nonuniform indistinguishability and unpredictability hardcore lemmas: new proofs and applications to pseudoentropy
M Skorski
International Conference on Information Theoretic Security, 123-140, 2015
22015
True random number generators secure in a changing environment: Improved security bounds
M Skorski
International Conference on Current Trends in Theory and Practice of …, 2015
22015
Bounds on Bayes Factors for Binomial A/B Testing
M Skorski
arXiv preprint arXiv:1903.00049, 2019
12019
Evaluation and monitoring of free running oscillators serving as source of randomness
EN Allini, M Skórski, O Petura, F Bernard, M Laban, V Fischer
12018
The system can't perform the operation now. Try again later.
Articles 1–20